In the age of computers and software, cybersecurity is extremely important, but one might not realize the relevance it has to social science principles. Professionals in this field utilize these principles to help anticipate risks that come from people. A specific role that one could hone in on is the cybersecurity analyst. This field utilizes…
Category: Uncategorized
SCADA Systems – What is Their Role in Critical Infrastructure
The SCADA system has a big role in keeping infrastructure related cyber threats at bay, but the systems are still vulnerable to things like unauthorized access and breaches in network (Scadasystems.net). SCADA – Defined Supervisory Control and Data Acquisition is what the acronym stands for. They are essential systems put in place to keep…
Thinking Like a CISO: Allocating Funds
Thinking like a Chief Information Security Officer, the most benefit to be gained in allocating funds would come from ensuring that the employees who operate the cyber realm of the company are trained, and the digital space is protected. 70% of the cyber defense budget would go to training employees whilst the remaining 30% would…
The CIA Triad – Guidance for Information Security in an Organization
The CIA Triad is used to ensure security systems are developed in such a way that the systems and the information that they hold are protected, and vulnerabilities are easy to fix (Fortinet). Information should be secure, trustworthy, and as accessible as possible. Confidentiality – Keep Information Safeguarded Confidentiality is ensuring data is secure. Roadblocks…